mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2025/01/12 12:31:56
This commit is contained in:
parent
67d8520694
commit
1ee5d2aae2
45 changed files with 236 additions and 164 deletions
|
@ -182,7 +182,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-11-14T04:35:59Z",
|
||||
"updated_at": "2025-01-05T15:26:10Z",
|
||||
"pushed_at": "2025-01-09T02:25:56Z",
|
||||
"pushed_at": "2025-01-12T11:49:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1183,10 +1183,10 @@
|
|||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:36:50Z",
|
||||
"updated_at": "2024-12-31T15:47:51Z",
|
||||
"updated_at": "2025-01-12T10:37:41Z",
|
||||
"pushed_at": "2023-02-02T02:17:30Z",
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"has_discussions": false,
|
||||
"forks_count": 77,
|
||||
"allow_forking": true,
|
||||
|
@ -1195,7 +1195,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 77,
|
||||
"watchers": 277,
|
||||
"watchers": 278,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -615,10 +615,10 @@
|
|||
"description": "is a PoC tool demonstrating an exploit for a known vulnerability in the WebDAV component of IIS6",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-06T17:33:11Z",
|
||||
"updated_at": "2024-10-21T08:15:02Z",
|
||||
"updated_at": "2025-01-12T11:49:52Z",
|
||||
"pushed_at": "2024-10-07T17:34:02Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -627,7 +627,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
33
2019/CVE-2019-5602.json
Normal file
33
2019/CVE-2019-5602.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 915577425,
|
||||
"name": "CVE-2019-5602-poc",
|
||||
"full_name": "test-one9\/CVE-2019-5602-poc",
|
||||
"owner": {
|
||||
"login": "test-one9",
|
||||
"id": 175934231,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175934231?v=4",
|
||||
"html_url": "https:\/\/github.com\/test-one9",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/test-one9\/CVE-2019-5602-poc",
|
||||
"description": "https:\/\/www.freebsd.org\/security\/advisories\/FreeBSD-SA-19:11.cd_ioctl.asc",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-12T08:24:58Z",
|
||||
"updated_at": "2025-01-12T08:26:34Z",
|
||||
"pushed_at": "2025-01-12T08:26:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1039,10 +1039,10 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2025-01-10T17:59:26Z",
|
||||
"updated_at": "2025-01-12T10:14:06Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1303,
|
||||
"watchers_count": 1303,
|
||||
"stargazers_count": 1304,
|
||||
"watchers_count": 1304,
|
||||
"has_discussions": false,
|
||||
"forks_count": 343,
|
||||
"allow_forking": true,
|
||||
|
@ -1057,7 +1057,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 343,
|
||||
"watchers": 1303,
|
||||
"watchers": 1304,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "poc for CVE-2020-13519(still under construction). needs refining , testing , tunning...",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-30T06:28:49Z",
|
||||
"updated_at": "2024-10-02T08:18:10Z",
|
||||
"updated_at": "2025-01-12T11:13:21Z",
|
||||
"pushed_at": "2024-09-30T06:30:50Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -300,5 +300,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 915270847,
|
||||
"name": "CVE-2021-21551",
|
||||
"full_name": "IlanDudnik\/CVE-2021-21551",
|
||||
"owner": {
|
||||
"login": "IlanDudnik",
|
||||
"id": 16364955,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16364955?v=4",
|
||||
"html_url": "https:\/\/github.com\/IlanDudnik",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/IlanDudnik\/CVE-2021-21551",
|
||||
"description": "Exploit implementation for CVE-2021-21551",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-11T12:18:40Z",
|
||||
"updated_at": "2025-01-12T11:49:34Z",
|
||||
"pushed_at": "2025-01-12T11:47:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"forks": 28,
|
||||
"watchers": 115,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T16:15:56Z",
|
||||
"updated_at": "2024-12-06T23:49:42Z",
|
||||
"updated_at": "2025-01-12T06:20:40Z",
|
||||
"pushed_at": "2021-06-12T08:27:09Z",
|
||||
"stargazers_count": 822,
|
||||
"watchers_count": 822,
|
||||
"stargazers_count": 823,
|
||||
"watchers_count": 823,
|
||||
"has_discussions": false,
|
||||
"forks_count": 139,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 139,
|
||||
"watchers": 822,
|
||||
"watchers": 823,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -541,10 +541,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2025-01-08T00:43:39Z",
|
||||
"updated_at": "2025-01-12T11:03:30Z",
|
||||
"pushed_at": "2023-10-11T18:44:51Z",
|
||||
"stargazers_count": 805,
|
||||
"watchers_count": 805,
|
||||
"stargazers_count": 806,
|
||||
"watchers_count": 806,
|
||||
"has_discussions": false,
|
||||
"forks_count": 170,
|
||||
"allow_forking": true,
|
||||
|
@ -560,7 +560,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 170,
|
||||
"watchers": 805,
|
||||
"watchers": 806,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -50,10 +50,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2025-01-11T17:36:36Z",
|
||||
"updated_at": "2025-01-12T07:43:36Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 822,
|
||||
"watchers_count": 822,
|
||||
"stargazers_count": 823,
|
||||
"watchers_count": 823,
|
||||
"has_discussions": false,
|
||||
"forks_count": 125,
|
||||
"allow_forking": true,
|
||||
|
@ -62,7 +62,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 125,
|
||||
"watchers": 822,
|
||||
"watchers": 823,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -381,10 +381,10 @@
|
|||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2025-01-11T13:37:38Z",
|
||||
"updated_at": "2025-01-12T10:32:11Z",
|
||||
"pushed_at": "2024-04-26T03:16:26Z",
|
||||
"stargazers_count": 1111,
|
||||
"watchers_count": 1111,
|
||||
"stargazers_count": 1112,
|
||||
"watchers_count": 1112,
|
||||
"has_discussions": false,
|
||||
"forks_count": 535,
|
||||
"allow_forking": true,
|
||||
|
@ -395,7 +395,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 535,
|
||||
"watchers": 1111,
|
||||
"watchers": 1112,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
@ -935,10 +935,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2025-01-10T05:22:28Z",
|
||||
"updated_at": "2025-01-12T10:31:59Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1813,
|
||||
"watchers_count": 1813,
|
||||
"stargazers_count": 1814,
|
||||
"watchers_count": 1814,
|
||||
"has_discussions": false,
|
||||
"forks_count": 530,
|
||||
"allow_forking": true,
|
||||
|
@ -952,7 +952,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 530,
|
||||
"watchers": 1813,
|
||||
"watchers": 1814,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
@ -3749,10 +3749,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2025-01-09T09:57:56Z",
|
||||
"updated_at": "2025-01-12T10:31:42Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3406,
|
||||
"watchers_count": 3406,
|
||||
"stargazers_count": 3407,
|
||||
"watchers_count": 3407,
|
||||
"has_discussions": true,
|
||||
"forks_count": 739,
|
||||
"allow_forking": true,
|
||||
|
@ -3761,7 +3761,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 739,
|
||||
"watchers": 3406,
|
||||
"watchers": 3407,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
|
|
@ -29,36 +29,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 448062357,
|
||||
"name": "CVE-2021-46068",
|
||||
"full_name": "plsanu\/CVE-2021-46068",
|
||||
"owner": {
|
||||
"login": "plsanu",
|
||||
"id": 61007700,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
|
||||
"html_url": "https:\/\/github.com\/plsanu",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46068",
|
||||
"description": "CVE-2021-46068 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T18:04:01Z",
|
||||
"updated_at": "2023-12-30T08:24:13Z",
|
||||
"pushed_at": "2022-01-14T19:34:08Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -76,10 +76,10 @@
|
|||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:36:50Z",
|
||||
"updated_at": "2024-12-31T15:47:51Z",
|
||||
"updated_at": "2025-01-12T10:37:41Z",
|
||||
"pushed_at": "2023-02-02T02:17:30Z",
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"has_discussions": false,
|
||||
"forks_count": 77,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 77,
|
||||
"watchers": 277,
|
||||
"watchers": 278,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -107,10 +107,10 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2025-01-06T05:11:29Z",
|
||||
"updated_at": "2025-01-12T10:36:38Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 1092,
|
||||
"watchers_count": 1092,
|
||||
"stargazers_count": 1093,
|
||||
"watchers_count": 1093,
|
||||
"has_discussions": false,
|
||||
"forks_count": 220,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 220,
|
||||
"watchers": 1092,
|
||||
"watchers": 1093,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
@ -1941,8 +1941,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-30T13:07:55Z",
|
||||
"updated_at": "2024-07-01T18:57:06Z",
|
||||
"pushed_at": "2024-07-01T18:57:03Z",
|
||||
"updated_at": "2025-01-12T11:29:30Z",
|
||||
"pushed_at": "2025-01-12T11:29:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2025-01-04T09:08:42Z",
|
||||
"updated_at": "2025-01-12T11:40:21Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1173,
|
||||
"watchers_count": 1173,
|
||||
"stargazers_count": 1176,
|
||||
"watchers_count": 1176,
|
||||
"has_discussions": true,
|
||||
"forks_count": 188,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 188,
|
||||
"watchers": 1173,
|
||||
"watchers": 1176,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-01T08:17:26Z",
|
||||
"updated_at": "2025-01-11T05:45:53Z",
|
||||
"updated_at": "2025-01-12T08:34:52Z",
|
||||
"pushed_at": "2025-01-01T08:17:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects both username-password and PIN authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T08:33:19Z",
|
||||
"updated_at": "2024-11-25T12:03:38Z",
|
||||
"updated_at": "2025-01-12T08:08:37Z",
|
||||
"pushed_at": "2024-07-19T06:36:55Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 85,
|
||||
"watchers": 86,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "Original PoC for CVE-2023-32784",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T17:08:55Z",
|
||||
"updated_at": "2025-01-10T09:06:50Z",
|
||||
"updated_at": "2025-01-12T11:49:13Z",
|
||||
"pushed_at": "2023-08-17T19:26:55Z",
|
||||
"stargazers_count": 632,
|
||||
"watchers_count": 632,
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 1380,
|
||||
"watchers_count": 1380,
|
||||
"has_discussions": false,
|
||||
"forks_count": 237,
|
||||
"forks_count": 238,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 237,
|
||||
"forks": 238,
|
||||
"watchers": 1380,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"forks": 64,
|
||||
"watchers": 276,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": "Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-30T04:23:04Z",
|
||||
"updated_at": "2024-12-17T20:19:30Z",
|
||||
"updated_at": "2025-01-12T06:37:01Z",
|
||||
"pushed_at": "2024-08-30T05:10:51Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": " Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 – 9.1.1.1 – Authentication Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-14T16:59:52Z",
|
||||
"updated_at": "2024-12-12T13:40:41Z",
|
||||
"updated_at": "2025-01-12T12:27:27Z",
|
||||
"pushed_at": "2024-11-14T17:00:59Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -59,6 +59,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -169,10 +169,10 @@
|
|||
"description": "Windows AppLocker Driver (appid.sys) LPE",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-29T13:18:06Z",
|
||||
"updated_at": "2025-01-07T15:13:48Z",
|
||||
"updated_at": "2025-01-12T09:27:29Z",
|
||||
"pushed_at": "2024-07-29T13:29:59Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -186,7 +186,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -234,10 +234,10 @@
|
|||
"description": "Proof-of-Concept for LFI\/Path Traversal vulnerability in Aiohttp =< 3.9.1",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-20T15:28:58Z",
|
||||
"updated_at": "2024-12-29T20:57:19Z",
|
||||
"updated_at": "2025-01-12T10:53:19Z",
|
||||
"pushed_at": "2024-10-20T16:48:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -246,7 +246,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-15T08:07:05Z",
|
||||
"updated_at": "2025-01-09T11:58:18Z",
|
||||
"updated_at": "2025-01-12T12:25:35Z",
|
||||
"pushed_at": "2024-09-08T21:23:34Z",
|
||||
"stargazers_count": 434,
|
||||
"watchers_count": 434,
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 434,
|
||||
"watchers": 435,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -1435,8 +1435,8 @@
|
|||
"description": "git clone rce CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-03T08:01:39Z",
|
||||
"updated_at": "2024-10-31T20:50:27Z",
|
||||
"pushed_at": "2024-07-09T01:52:48Z",
|
||||
"updated_at": "2025-01-12T11:27:41Z",
|
||||
"pushed_at": "2025-01-12T11:27:38Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -565,8 +565,8 @@
|
|||
"description": "PoC for CVE-2024-34102",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-13T07:33:20Z",
|
||||
"updated_at": "2024-10-04T10:38:23Z",
|
||||
"pushed_at": "2024-08-13T08:48:46Z",
|
||||
"updated_at": "2025-01-12T11:26:57Z",
|
||||
"pushed_at": "2025-01-12T11:26:54Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-13T19:30:20Z",
|
||||
"updated_at": "2025-01-12T01:25:05Z",
|
||||
"updated_at": "2025-01-12T11:55:04Z",
|
||||
"pushed_at": "2024-11-29T16:56:23Z",
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 262,
|
||||
"watchers": 263,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Spring Cloud Data Flow CVE-2024-37084 exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-15T06:55:05Z",
|
||||
"updated_at": "2024-10-16T02:27:56Z",
|
||||
"updated_at": "2025-01-12T11:16:15Z",
|
||||
"pushed_at": "2024-10-16T02:27:53Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -19,15 +19,15 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -121,6 +121,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof of concept (POC) for CVE-2024-45337 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-17T22:07:53Z",
|
||||
"updated_at": "2024-12-19T08:35:28Z",
|
||||
"updated_at": "2025-01-12T12:23:48Z",
|
||||
"pushed_at": "2024-12-17T22:27:03Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -36,7 +36,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-46538",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-23T10:50:01Z",
|
||||
"updated_at": "2025-01-12T02:15:53Z",
|
||||
"pushed_at": "2025-01-10T02:12:42Z",
|
||||
"updated_at": "2025-01-12T11:25:17Z",
|
||||
"pushed_at": "2025-01-12T11:25:15Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -169,10 +169,10 @@
|
|||
"description": "Ultrafast CUPS-browsed scanner (CVE-2024-47176)",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-29T09:05:30Z",
|
||||
"updated_at": "2024-11-20T16:31:06Z",
|
||||
"updated_at": "2025-01-12T10:59:27Z",
|
||||
"pushed_at": "2024-10-07T19:24:35Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -187,7 +187,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -59,6 +59,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -262,10 +262,10 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-46538",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-03T02:30:53Z",
|
||||
"updated_at": "2025-01-10T02:20:21Z",
|
||||
"updated_at": "2025-01-12T07:56:06Z",
|
||||
"pushed_at": "2025-01-03T18:51:20Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -282,7 +282,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -45,8 +45,8 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-5932",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-25T11:51:36Z",
|
||||
"updated_at": "2025-01-05T01:14:48Z",
|
||||
"pushed_at": "2024-08-29T02:13:12Z",
|
||||
"updated_at": "2025-01-12T11:24:29Z",
|
||||
"pushed_at": "2025-01-12T11:24:26Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-9014",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-26T10:34:34Z",
|
||||
"updated_at": "2024-10-15T07:52:36Z",
|
||||
"pushed_at": "2024-09-26T10:45:34Z",
|
||||
"updated_at": "2025-01-12T11:26:00Z",
|
||||
"pushed_at": "2025-01-12T11:25:57Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -59,6 +59,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -107,10 +107,10 @@
|
|||
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-11T02:06:51Z",
|
||||
"updated_at": "2025-01-12T03:33:28Z",
|
||||
"updated_at": "2025-01-12T12:03:23Z",
|
||||
"pushed_at": "2025-01-11T23:54:06Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,38 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 915634472,
|
||||
"name": "CVE-2025-0282-Full-version",
|
||||
"full_name": "anonzoli\/CVE-2025-0282-Full-version",
|
||||
"owner": {
|
||||
"login": "anonzoli",
|
||||
"id": 185355974,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185355974?v=4",
|
||||
"html_url": "https:\/\/github.com\/anonzoli",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/anonzoli\/CVE-2025-0282-Full-version",
|
||||
"description": "# CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS]",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-12T11:58:40Z",
|
||||
"updated_at": "2025-01-12T12:16:53Z",
|
||||
"pushed_at": "2025-01-12T12:15:44Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
10
README.md
10
README.md
|
@ -10,6 +10,7 @@
|
|||
- [BishopFox/CVE-2025-0282-check](https://github.com/BishopFox/CVE-2025-0282-check)
|
||||
- [NyxanGoat/CVE-2025-0282-PoC](https://github.com/NyxanGoat/CVE-2025-0282-PoC)
|
||||
- [absholi7ly/CVE-2025-0282-Ivanti-exploit](https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit)
|
||||
- [anonzoli/CVE-2025-0282-Full-version](https://github.com/anonzoli/CVE-2025-0282-Full-version)
|
||||
|
||||
### CVE-2025-22352 (2025-01-07)
|
||||
|
||||
|
@ -25220,6 +25221,7 @@
|
|||
- [tijme/kernel-mii](https://github.com/tijme/kernel-mii)
|
||||
- [nanabingies/CVE-2021-21551](https://github.com/nanabingies/CVE-2021-21551)
|
||||
- [Eap2468/CVE-2021-21551](https://github.com/Eap2468/CVE-2021-21551)
|
||||
- [IlanDudnik/CVE-2021-21551](https://github.com/IlanDudnik/CVE-2021-21551)
|
||||
|
||||
### CVE-2021-21716
|
||||
- [MojithaR/CVE-2023-21716-EXPLOIT.py](https://github.com/MojithaR/CVE-2023-21716-EXPLOIT.py)
|
||||
|
@ -30118,7 +30120,6 @@
|
|||
</code>
|
||||
|
||||
- [plsanu/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS)
|
||||
- [plsanu/CVE-2021-46068](https://github.com/plsanu/CVE-2021-46068)
|
||||
|
||||
### CVE-2021-46069 (2022-01-06)
|
||||
|
||||
|
@ -36624,6 +36625,13 @@
|
|||
|
||||
- [raymontag/CVE-2019-5596](https://github.com/raymontag/CVE-2019-5596)
|
||||
|
||||
### CVE-2019-5602 (2019-07-03)
|
||||
|
||||
<code>In FreeBSD 12.0-STABLE before r349628, 12.0-RELEASE before 12.0-RELEASE-p7, 11.3-PRERELEASE before r349629, 11.3-RC3 before 11.3-RC3-p1, and 11.2-RELEASE before 11.2-RELEASE-p11, a bug in the cdrom driver allows users with read access to the cdrom device to arbitrarily overwrite kernel memory when media is present thereby allowing a malicious user in the operator group to gain root privileges.
|
||||
</code>
|
||||
|
||||
- [test-one9/CVE-2019-5602-poc](https://github.com/test-one9/CVE-2019-5602-poc)
|
||||
|
||||
### CVE-2019-5603 (2019-07-26)
|
||||
|
||||
<code>In FreeBSD 12.0-STABLE before r350261, 12.0-RELEASE before 12.0-RELEASE-p8, 11.3-STABLE before r350263, 11.3-RELEASE before 11.3-RELEASE-p1, and 11.2-RELEASE before 11.2-RELEASE-p12, system calls operating on file descriptors as part of mqueuefs did not properly release the reference allowing a malicious user to overflow the counter allowing access to files, directories, and sockets opened by processes owned by other users.
|
||||
|
|
Loading…
Add table
Reference in a new issue